
Users can use the selected functions only.
For details about specifying available functions for individuals or groups, see page 50 "Limiting
Available Functions".
17.
Press [OK].
18.
Press [OK].
19.
Press the [Login/Logout] key.
A confirmation message appears. If you press [Yes], you will be automatically logged out.
Installing Internet Information Services (IIS) and Certificate Services
Specify this setting if you want the machine to automatically obtain user informations registered in Active
Directory.
We recommend you install Internet Information Services (IIS) and Certificate services as Windows
components.
Install the components, and then create the server certificate.
If they are not installed, install them as follows:
Installation under Windows Server 2008 R2
1.
On the [Start] menu, point to [Administrative Tools], and then click [Server Manager].
2.
Click [Roles] in the left column, click [Add Roles] from the [Action] menu.
3.
Click [Next>].
4.
Select the "Web Server (IIS)" and "Active Directory Certificate Services" check boxes, and
then click [Next>].
If a confirmation message appears, click [Add Features].
5.
Read the content information, and then click [Next>].
6.
Check that [Certification Authority] is selected, and then click [Next>].
7.
Select [Enterprise], and then click [Next>].
8.
Select [Root CA], and then click [Next>].
9.
Select [Create a new private key], and then click [Next>].
10.
Select a cryptographic service provider, key length, and hash algorithm to create a new
private key, and then click [Next>].
11.
In "Common name for this CA:", enter the Certificate Authority name, and then click
[Next>].
12.
Select the validity period, and then click [Next>].
2. Configuring User Authentication
36
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...